Audience

Organizations that need an effective privileged access management solution

About Symantec PAM

Privileged accounts provide elevated and unrestricted access to users and systems and are necessary to perform key activities. Privileged accounts provide elevated and unrestricted access to users and systems and are necessary to perform key activities. Unfortunately, they are also one of the most common attack vectors because, when compromised, they enable hackers to access critical systems, steal sensitive data, and deploy malicious code. Today’s privileged access management technologies must not only enable you to create and enforce controls over users and systems that have elevated or “privileged” entitlements, but with the explosion of virtualized and cloud environments, the attack surface and number and types of privileged accounts have increased exponentially.

Integrations

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

Broadcom
Founded: 1991
United States
www.broadcom.com/products/identity/pam

Videos and Screen Captures

Other Useful Business Software
Go from Code to Production URL in Seconds Icon
Go from Code to Production URL in Seconds

Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.

Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
Try it free

Product Details

Platforms Supported
Cloud
Training
Live Online
Support
Online

Symantec PAM Frequently Asked Questions

Q: What kinds of users and organization types does Symantec PAM work with?
Q: What languages does Symantec PAM support in their product?
Q: What kind of support options does Symantec PAM offer?
Q: What other applications or services does Symantec PAM integrate with?
Q: What type of training does Symantec PAM provide?

Symantec PAM Product Features

Privileged Access Management

Behavioral Analytics
Credential Management
Multifactor Authentication
Password Management
Threat Intelligence
User Activity Monitoring
Application Access Control
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Policy Management
Remote Access Management